Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.54093
Category:SuSE Local Security Checks
Title:SuSE Security Advisory SUSE-SA:2003:040 (sendmail, sendmail-tls)
Summary:NOSUMMARY
Description:Description:

The remote host is missing updates announced in
advisory SUSE-SA:2003:040.

sendmail is the most widely used mail transport agent (MTA) in the
internet. A remotely exploitable buffer overflow has been found in all
versions of sendmail that come with SuSE products. These versions include
sendmail-8.11 and sendmail-8.12 releases. sendmail is the MTA subsystem
that is installed by default on all SuSE products up to and including
SuSE Linux 8.0 and the SuSE Linux Enterprise Server 7.

The vulnerability discovered is known as the prescan()-bug and is not
related to the vulnerability found and fixed in April 2003. The error
in the code can cause heap or stack memory to be overwritten, triggered
by (but not limited to) functions that parse header addresses.

Solution:
Update your system with the packages as indicated in
the referenced security advisory.

http://www.securityspace.com/smysecure/catid.html?in=SUSE-SA:2003:040

Risk factor : Critical

CVSS Score:
10.0

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2003-0694
Bugtraq: 20030917 GLSA: sendmail (200309-13) (Google Search)
http://marc.info/?l=bugtraq&m=106383437615742&w=2
Bugtraq: 20030917 Sendmail 8.12.9 prescan bug (a new one) [CAN-2003-0694] (Google Search)
http://marc.info/?l=bugtraq&m=106381604923204&w=2
Bugtraq: 20030917 [slackware-security] Sendmail vulnerabilities fixed (SSA:2003-260-02) (Google Search)
http://marc.info/?l=bugtraq&m=106382859407683&w=2
Bugtraq: 20030919 [OpenPKG-SA-2003.041] OpenPKG Security Advisory (sendmail) (Google Search)
http://marc.info/?l=bugtraq&m=106398718909274&w=2
http://www.cert.org/advisories/CA-2003-25.html
CERT/CC vulnerability note: VU#784980
http://www.kb.cert.org/vuls/id/784980
Conectiva Linux advisory: CLA-2003:742
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000742
Debian Security Information: DSA-384 (Google Search)
http://www.debian.org/security/2003/dsa-384
FreeBSD Security Advisory: FreeBSD-SA-03:13
http://archives.neohapsis.com/archives/fulldisclosure/2003-q3/4119.html
HPdes Security Advisory: SSRT3631
Immunix Linux Advisory: IMNX-2003-7+-021-01
http://www.mandriva.com/security/advisories?name=MDKSA-2003:092
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2975
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A572
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A603
http://www.redhat.com/support/errata/RHSA-2003-283.html
http://www.redhat.com/support/errata/RHSA-2003-284.html
SCO Security Bulletin: CSSA-2003-036.0
SCO Security Bulletin: SCOSA-2004.11
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.11/SCOSA-2004.11.txt
http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0113.html
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.